4.3
CVSSv2

CVE-2017-15646

Published: 19/10/2017 Updated: 08/11/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Webmin prior to 1.860 has XSS with resultant remote code execution. Under the 'Others/File Manager' menu, there is a 'Download from remote URL' option to download a file from a remote server. After setting up a malicious server, one can wait for a file download request and then send an XSS payload that will lead to Remote Code Execution, as demonstrated by an OS command in the value attribute of a name='cmd' input element.

Vulnerable Product Search on Vulmon Subscribe to Product

webmin webmin

Exploits

[+] SSD Beyond Security: blogssecuriteamcom/indexphp/archives/3430 [+] Credits: John Page (aka hyp3rlinx) [+] Website: hyp3rlinxaltervistaorg [+] Source: hyp3rlinxaltervistaorg/advisories/WEBMIN-v1850-REMOTE-COMMAND-EXECUTIONtxt [+] ISR: ApparitionSec Vulnerability summary The following advisory describes t ...